Single-channel color image encryption algorithm based on fractional Hartley

Single-channel color image encryption algorithm based on fractional Hartley
Single-channel color image encryption algorithm based on fractional Hartley

Single-channel color image encryption algorithm based

on fractional Hartley transform and vector operation

Ye Liu &Juan Du &Jinghui Fan &Lihua Gong

#Springer Science+Business Media New York 2013

Abstract A single-channel color image encryption algorithm is proposed by combining fractional Hartley transform (FRHT)with vector operation.The original color image is decomposed into RGB components and the G and B components are encrypted into two phase-only masks θG and θB with vector operation,respectively.The R ,θG and θB are transformed by FRHT and vector operation twice to obtain amplitude,random phase and decryption phase key.The new amplitude combined with the random phase is transformed by FRHT once more and then the result is scrambled by the chaotic scrambling to strengthen the security of the algorithm.The private phase key is dependent on the original image,which makes the proposed encryption algorithm more secure than the linear color image encryption algorithm based on the double random phase encoding in FRHT.Simulation results demon-strate the security and effectiveness of the proposed algorithm.

Keywords Vector operation .Fractional Hartley transform .Image encryption .

Information security

1Introduction

With the civilization and progress of the society,people pay more and more attention to the protection of personal privacy.Image is widely used as an effective information carrier because of its vivid and lively.In order to ensure the security of the private image information,image encryption is one of the effective approaches.Since Refregier and Javidi [13]first proposed the double random phase encoding in Fourier transform (FT)domain in 1995,it has been extended DOI

10.1007/s11042-013-1778-0

Y .Liu (*):J.Du :J.Fan :L.Gong

Department of Electronic Information Engineering,Nanchang University,Nanchang 330031,China e-mail:liuye@https://www.360docs.net/doc/eb2756613.html,

J.Du

e-mail:ncujdu@https://www.360docs.net/doc/eb2756613.html,

J.Fan

e-mail:jinghuifan@https://www.360docs.net/doc/eb2756613.html,

L.Gong

e-mail:ncuglh@https://www.360docs.net/doc/eb2756613.html,

L.Gong

Jiangxi Province Key Laboratory of Image Processing and Pattern Recognition,

Nanchang Hangkong University,Nanchang 330063,China

into Fresnel transform (FRT)domain [5,14],and fractional Fourier transform (FRFT)domain

[7,15,16].FRFT is the generalization of FT.The fractional orders of FRFT are extra keys to encrypt images compared with FT.Considering FT has its fractional form,researchers expect to find the fractional form for Hartley transform (HT).Some researchers define FRHT as the sum of the real and imaginary of the FRFT.The output of FRHT defined in this way for a real input is real,but it does not satisfy the additive property and has no inverse transform.In order to overcome the flaws,Pei and Ding [12]presented a redefined FRHT.Then some researchers encrypt an image by extending the double random encoding technique to the redefined FRHT

[6,18].But the redefined FRHT is not a real transform,Li and Zhao [8]suggested a special form named simplified fractional Hartley transform (SFRHT)for the redefined FRHT,and then proposed an image encryption method with SFRHT.Li and Zhao [9]also proposed a three-channel color image encryption algorithm using double random phase encoding based on FRHT in RGB space to extend the application field of the redefined FRHT to color image.Color image encryption has become an important part of image security not only for its beauty in vision but also for the meaningful practical use [4].Three-channel technique for color image encryption needs multiple light sources and sets of optical components which increase the difficulty and cost of the system [1,2,10],while single-channel technique only needs a light source and a set of optical components.Moreover the outcome of the latter is more compact and robust than that of the former [3,11].So single-channel technique is an important method and research direction for color image encryption.Considering FRHT is a linear transform and the linear encryption system based on double random phase encoding in FRHT domain is more vulnerable to some common attacks such as known-plaintext attack,chosen-plaintext attack,chosen-ciphertext attack and ciphertext-only attack [19,20],a new single channel color image encryption algorithm based on FRHT,vector operation and chaos theory is proposed.In this method,the private phase key θA 1is dependent on the original image.It is in vain to attack the encryption system for the private phase key to obtain any other original images decrypted by this system.

The remainder of this paper is organized as follows:Section 2represents some basic theories of the proposed method.The proposed algorithm is described in Section 3.Performance and security analyses are reported in Section 4.Conclusions are stated in Section 5.

2Basic theories

2.1Vector operation

The addition of two vectors [17]in the two-dimensional Cartesian coordinate system can be completed geometrically by the sum of two complex numbers.

z 3?z 1tz 2

e1TThe angle θbetween complex numbers z 1and z 2is

θ?π?acrcos z 1j j 2tz 2j j 2?z 3j j 2 =2z 1j j z 2j j eT e2T

so the addition of two unit vectors can be accomplished geometrically in the polar coordinate system by

z 3?exp i ?1eTtexp i ?2eTe3T

where ?1and ?2are the arguments of complex numbers z 1and z 2,respectively.It is easy to get

z 3j j 2?exp i ?1eTtexp i ?2eTj j 2e4T

Consequently,|z 3|2can be decomposed into two phases ?1and ?2.The pixel values of a normalized image are between 0and 1,so are the pixel square root values.It is obvious that the pixel square root values of a normalized image and the two unit vectors satisfy the triangle inequality.Therefore,a pixel value f of a normalized grayscale image can be regarded as the square of the modulus of two complex numbers whose modulus values equal 1and represented as

f ?exp i ?eTtexp i ?tθeT? j j 2e5T

where ?is an arbitrary random phase whose values are between 0and 2π,θis between 0and πand satisfies

θ?π?arccos 1?f =2eTe6T

Equations (6)and (7)are the forward and inverse transforms of the vector operation.As a result,a normalized grayscale image can be encoded into a phase-only mask θwithout any iterative process.

2.2Fractional Hartley transform

As for an input grayscale image f (x ,y ),the two dimensional FRHT H [6,9,18]can be defined as an addition of two FRFTs.

H p 1;p 2f x ;y eT? x 0;y 0

eT?1te i ?1t?2eT=22F p 1;p 2f x ;y eT? x 0;y 0eTt1?e i ?1t?2eT=22F p 1t2;p 2t2f x ;y eT? x 0;y 0eTe7T

where p 1and p 2are fractional orders,?1=p 1π/2and ?2=p 2π/2,and F is the FRFT.

From Eq.(7)and the properties of FRFT,one can obtain that the FRHT satisfies the index additive property,and has the period with 2.Moreover,when p 1=p 2=1,the FRHT reduces to HT.

The inverse transform of the FRHT is the transform H with the opposite fractional orders ?p 1and ?p 2.

3Single-channel color image encryption based on FRHT and vector operation

3.1Encryption process

For a color image with M ×N ×3pixels,the proposed encryption process is shown in Fig.1.The detail steps are described as follows:

(1)The normalized G and B components of the original color image are respectively

converted to phase-only masks θG and θB with vector operation.

θG ?π?arccos 1?G =2eT

e8TθB ?π?arccos 1?B =2eTe9T

(2)The R component combined with phase θG is encoded into complex amplitude,and

subsequently transformed by FRHT.

A 0exp i ?0eT?H a R exp i θG eT? e10T

Then the amplitude A 0and the phase ?0can be extracted from the result and then converted into phase-only mask θA 020;π? and real amplitude A ?0∈0;255? by

θA 0?π?arccos 1?A 0=2eT

e11TA ?0??0=2πeT?255e12T

(3)A ?0and θB are regarded as the amplitude and phase of the input data respectively and

then transformed by repeating step (2).The output is

θA 1?π?arccos 1?A 1=2eT

e13TA ?1??1=2πeT?255e14T

where the θA 1is recorded and transmitted as the private phase key of decryption.

(4)To strengthen the security of the encryption system,FRHT is performed once more

A 2exp i ?2eT?H a A ?1exp i θA 0eT??e15T

(5)The above steps just change the value of the pixel.To further change the position of the

pixel,A 2is permutated by the chaotic scrambling algorithm in Ref.[21]to obtain the final encrypted image C .The phase ?2is its accompanying phase.

To decrease the number of keys,bifurcation parameter u and the number of discarding values K of the logistical map in the chaotic scrambling process can be set as constants.Fig.1Schematic of encryption

3.2Decryption process

With the ciphertext C,its accompanying phase?2and the keys including the fractional

order a of FRHT,the seed of the chaotic scrambling s and the private phase keyθA

1 generated in the encryption process,the decryption steps is just the inverse process of the

encryption steps.The final decrypted color image can be obtained by combining the

RGB components together.

4Numerical simulations and discussions

The color image‘Brain’with the size of290×290shown in Fig.2a is used as the test

image.The order a of the FRHT is set as0.5.The seed s of the chaotic scrambling is set

as0.221.The amplitude and the phase distributions of the encrypted image are shown in

Fig.2b and c respectively.The decrypted color image with all correct keys is shown in

Fig.2d.

Figure3shows the decrypted color image with incorrect keys.Figure3a shows the

decrypted color image with the incorrect FRHT order a=0.5+0.01while the other keys are

correct.Figure3b shows the decrypted color image with incorrect seed s=0.221+1×10?15

while the other keys are correct.Figure3c displays the incorrect private phase keyθA

1 interfered by a random phase produced by computer while the other keys are correct.When

the deviation of the fractional order is larger than0.01,the deviation of the seed is larger than

1×10?15or the private decryption phase key is incorrect,the decrypted image cannot be

recognized.

4.1Statistical analysis

Statistical analysis of the proposed image encryption algorithm can be tested from two aspects.

One is to test the histograms of the encrypted images of different color images and the other is

to test the correlations of adjacent pixels of the plain image and its corresponding encrypted

image.Figure4a and b display the histograms of the encrypted images of two different original

color images‘brain’and‘Lena’respectively.

Seeing from Fig.4,when the proposed encryption algorithm is carried out on different

original color images brain with290×290pixels and Lena with512×512pixels,the distri-

butions of the histograms of the encrypted images are similar.Therefore,the attackers cannot

obtain any valid information through statistical analysis.

Fig.2a Original color image‘brain’,b amplitude distribution of the encrypted image,c phase distribution of the encrypted image and d decrypted image with correct keys

The correlation coefficient r xy of two adjacent pixels of a grayscale image can be calculated by

r xy ?cov x ;y eT??????????D x eTp ???????????D y eT

p e16Tcov x ;y eT?1X i ?1K

x i ?E x eTeTy i ?E y eTeT? e17Twhere x and y are the gray levels of two adjacent pixels in the image,E x eT?1∑i K

x i and

D x eT?1K

∑i ?1K x i ?E x eT? 2

.To test the correlation between two adjacent vertical,horizontal or diagonal pixels in the original or encrypted images,5,000pairs of adjacent pixels of the image are chosen randomly.Table 1displays the correlation coefficients of the original image and the encrypted image.The correlation coefficient of the plaintext is enormous in each direction of each component,while the correlation coefficient of the encrypted image is tiny in each direction.The adjacent pixels of the encrypted image are almost no relationship.Therefore,the encryption algorithm removes the tight relationship between adjacent pixels of the plaintext successfully.The results indicate that the proposed algorithm improves the ability of the encryption algorithm to resist statistical

analysis.Fig.3Decrypted color images with:a incorrect order a ,b incorrect seed s ,c incorrect private phase θA

1a

b 0500100015002000

25003000

0501001502002500100

200

300

400

500

600

700

800

9001000050100150200250Fig.4a Histogram of ciphertext of Lena and b histogram of ciphertext of Brain

4.2Sensitivity of the keys

To express the quality of the decrypted image,the mean square error (MSE)between the original and the decrypted grayscale image is introduced as

MSE ?1M ?N

X N i ;j ?1f 0i ;j eT?f i ;j eTj j 2e18Twhere M and N separately represent the height and width of the image,f ’(i ,j )and f (i ,j )denote the pixel values of the decrypted image and the original image,respectively.The MSE of the color image is

MSE ?MSE r tMSE g tMSE b

3e19T

where MSE r ,MSE g ,MSE b are computed by using Eq.(18).

Figure 5a and b show the deviation of MSE versus fractional order a and the seed of the chaotic scrambling s ,severally.The MSE approximates to zero when the image is decrypted with correct fractional order or seed,whereas the MSE increases sharply when the fractional order or seed slightly departs from the correct value.The order a and the seed s are both very sensitive seeing from Figs.3and 5.

Table 1Correlation of two adjacent pixels of the original and encrypted image

Correlation coefficient Original image

Encrypted image R

G B Encrypted amplitude Encrypted phase Horizontal

0.98760.97970.95160.00840.0247V ertical

0.98740.97990.95160.00870.0472Diagonal 0.98770.97710.94720.00450.0299

a b

1

2

34d M S E x 10-14d

M S E Fig.5MSE versus the deviation of (a )the fractional order a and (b )the seed s

4.3Key space analysis

Since the chaotic scrambling algorithm is independent from the FRHT,the key space of the cryptosystem consists of FRHT keys and chaotic keys.As the bifurcation parameter u and the number of discarding values K in the chaotic scrambling process are set as constants,to calculate the key space of the chaotic scrambling module denoted by S 1,we only need to consider the key space of the seed s .The key space of the seed S 1is 1015from Fig.3.In the

process of FRHT,only the key space of the private phase key θA 10is considered and denoted

by S 2.In order to evaluate the key space of the private phase key,we consider the phase key

θA 1is fluctuating in certain range,and the pseudo-key θA 10close to correct key is expressed as

θA 10?θA 1td ΔθA 1e20T

where ΔθA 1is a random phase function whose value is located in (0,2π),θA 1is the correct key and d is a coefficient whose value is located in (?1,1).Figure 6shows the deviation of MSE versus the perturbation of private phase key θA 1.Here,5,000is regarded as the threshold.When the MSE is more than 5,000,we cannot obtain any valid information from the decrypted image in vision.The maximum Δd is 0.1241.The key space of the private phase S 2is huge as (2π/0.1241)290×290?51290×290.So the whole key space of the cryptosystem is huge as S 1×S 2=51290×290×1015.Therefore the key space of the proposed algorithm is enormous enough to resist brute-force attack.

4.4Noise attack

The ciphertext affected by noise can be expressed as

C 0?C tkG e21T

where C ’and C are the noisy ciphertext and the ideal ciphertext,respectively.k is the coefficient of the noise strength.G is the Gaussian random noise with zero-mean and identity standard deviation.Figure 7shows the decrypted images when k equals to 1,10,20,

d

M S E Fig.6MSE versus the perturbation of the private phase key θA 1

respectively.With the k increasing,the recovered image becomes more and more ambiguous.From the results we can realize that even when k =20,the main information of the image can also be recognized.So the proposed technique is secure against noise attack.

4.5Comparison of our approach with existing method

Common attacks such as known-plaintext attack,chosen-plaintext attack and chosen-ciphertext attack require plaintext –ciphertext pairs.Chosen-plaintext/ciphertext attack even requires specific plaintexts/ciphertexts.In a linear encryption system,it is obvious that the ciphertext of αP 1+βP 2is αC 1+βC 2where P 1,P 2are original images,C 1,C 2are their corresponding encrypted images and α,βare two scalar coefficients.So a cryptanalyst can use linear equations C =TP or delta functions formed by particular linear combinations of P 1,P 2or C 1,C 2to attack the encryption system.Our proposed algorithm is more secure against the above attacks compared with the linear color image encryption algorithm proposed in [9],not only because our method is nonlinear with the use of nonlinear transform namely vector operation,but also because the two random phases used in [9]are independent of the original image while the private phase key θA 1generated in the encryption process is dependent on the original image.That is to say,in the former method,the wanted original images can be recovered by the phase keys reconstructed by the above attacks,while in the latter method,the wanted original images cannot.

5Conclusion

By applying the FRHT,vector operation and chaos theory,a single-channel color image encryption algorithm is https://www.360docs.net/doc/eb2756613.html,paring with HT,FRHT can provide fractional orders as the additional keys to improve the security of the algorithm,but it is linear.In order to strengthen the security of the system,vector operation and logistic map are further applied to make the image encryption system nonlinear and disorder.The vector operation is simple and fast since it can encrypt a grayscale image into a phase-only mask without any iterative process.Moreover the proposed scheme is performed in a single channel which is more compact and robust than conventional multiple-channel encryption system.The original color image cannot be recovered unless all of the keys including fractional order,the seed of logistic map and private phase are all correct.Moreover the private phase key relies on the original color image.It is impossible to obtain any information of other original images by

the

Fig.7Results of noise attack:a k =1,b k =10,c k =20

accompanying private phase key of the certain original image.Simulation results demonstrate that the proposed algorithm is secure with sensitive keys,large key space,anti-noise ability and anti-statistic ability.

Acknowledgments The work is supported by the National Natural Science Foundation of China(Grant Nos. 61262084and61141007),the Foundation for Young Scientists of Jiangxi Province(Jinggang Star)(Grant No. 20122BCB23002),and the Opening Project of Key Laboratory of Image Processing and Pattern Recognition (Nanchang Hangkong University),Jiangxi Province(Grant No.TX201204002).

References

1.Chen W,Chen XD(2011)Optical color image encryption based on an asymmetric cryptosystem in the

Fresnel domain.Opt Commun284:3913–3917

2.Chen LF,Zhao DM(2009)Color image encoding in dual fractional Fourier-wavelet domain with random

phases.Opt Commun282:3433–3438

3.Deng XP,Zhao DM(2012)Single-channel color image encryption based on asymmetric cryptosystem.Opt

Laser Technol44:136–140

4.Guo Q,Liu ZJ,Liu ST(2010)Color image encryption by using Arnold and discrete fractional random

transforms in IHS space.Opt Laser Eng48:800–805

5.Hwang HE,Han P(2006)Fast algorithm of phase mask for image encryption in Fresnel domain.J Opt Soc

Am A23:1870–1874

6.Jimenez C,Torres C,Mattos L(2011)Fractional Hartley transform applied to optical image encryption.J

Phys.doi:10.1088/1742-6596/274/1/012041

7.Joshi M,Shakher C,Singh K(2007)Color image encryption and decryption using fractional Fourier

transform.Opt Commun279:35–42

8.LI XX,Zhao DM(2008)Optical Image encryption with simplified fractional Hartley transform.Chinese

Phys Lett25:2477–2480

9.Li XX,Zhao DM(2010)Optical color image encryption with redefined fractional Hartley transform.Optik

121:673–67

10.Liu ZJ,Da JM,Sun XG,Liu ST(2010)Color image encryption by using the rotation of color vector in

Hartley transform domains.Opt Laser Eng48:800–805

11.Madhusudan J,Chandra S,Kehar S(2008)Color image encryption and decryption for twin images in

fractional Fourier domain.Opt Commun281:5713–15720

12.Pei SC,Ding JJ(2002)Fractional cosine,sine,and Hartley transforms.IEEE Trans Signal Process50:1661–

1680

13.Refregier P,Javidi B(1995)Optical image encryption based on input plane and Fourier plane random

encoding.Opt Lett20:767–769

14.Situ G,Zhang J(2004)Double random-phase encoding in the Fresnel domain.Opt Lett29:1584–1586

15.Tao R,Xin Y,Wang Y(2007)Double image encryption based on random phase encoding in fractional

Fourier domain.Opt Express15:16067–16079

16.Unnikrishnan G,Joseph J,Singh K(2000)Optical encryption by double-random phase encoding in the

fractional Fourier domain.Opt Lett25:887–889

17.Wang XG,Zhao DM(2011)Image encoding based on coherent superposition and basic vector operations.

Opt Commun284:945–951

18.Zhao DM,Li XX,Chen LF(2008)Optical image encryption with redefined fractional Hartley transform.

Opt Commun281:5326–5329

19.Zhou NR,Wang YX,Gong LH(2011)Novel optical image encryption scheme based on fractional Mellin

transform.Opt Commun284:3234–3242

20.Zhou NR,Wang YX,Gong LH,Chen XB,Yang YX(2012)Novel color image encryption algorithm based

on the reality preserving fractional Mellin transform.Opt Laser Technol44:2270–2281

21.Zhou NR,Wang YX,Gong LH,He H,Wu JH(2011)Novel single-channel color image encryption

algorithm based on chaos and fractional Fourier transform.Opt Commun284:2789–2796

Y e Liu received the B.S.degree in Radio Engineering from Hefei University of Technology,Hefei,China,in 1982.She is currently a professor of the electronic information engineering at Nanchang University.Her areas of interests are media security and wireless sensor network.Email:liuye@https://www.360docs.net/doc/eb2756613.html,

Juan Du received the B.S.degree in Communication Engineering from Nanchang University,China,in2011. She is currently pursuing the Master Degree in Signal and Information Processing at Nanchang University.Her areas of interests are multimedia security and image processing.

Jinghui Fan received his Bachelor Degree and Master Degree from Nanchang University in2001and2004, respectively.He is currently a lecturer of Department of Electronic Information Engineering,Nanchang Univer-sity.His interests are signal processing and information security.Email:jinghuifan@https://www.360docs.net/doc/eb2756613.html,

Lihua Gong received her Master Degree in Engineering in Electronic&Communication Engineering from Nanchang University in2011and Bachelor Degree in Physics from Jiangxi Normal University in2001.Since 2006she served as one of the Faculty of Department of Electronic Information Engineering,Nanchang University.She has published over20papers on information security in refereed international conferences and

journals.

常用计算机术语翻译

专心翻译 做到极致 常用计算机术语翻译--本地化 软件本地化行业有很多经常使用的行业术语,非行业人士或刚刚进入该行业的新人,常常对这些术语感到困惑。另外,软件本地化行业属于信息行业,随着信息技术的迅速发展,不断产生新的术语,所以,即使有多年本地化行业经验的专业人士,也需要跟踪和学习这些新的术语。 本文列举最常用的本地化术语,其中一些也大量用在普通信息技术行业。对这些常用的术语,进行简明的解释,给出对应的英文。 加速键或快捷键(accelerate key)。常应用在Windows 应用程序中,同时按下一系列组合键,完成一个特定的功能。例如,Ctrl + P ,是打印的快捷键。 带重音的字符(accented character)。例如在拉丁字符的上面或下面,添加重音标示符号。对于汉字没有此问题。 校准(alignment)。通过比较源语言文档和翻译过的文档,创建翻译数据库的过程。使用翻译记忆工具可以半自动化地完成此过程。 双向语言(bi-directional language)。对于希伯莱语言或者阿拉伯语言,文字是从右向左显示,而其中的英文单词或商标符号从左向右显示。对于中文,都是从左向右显示。 编译版本(build)。软件开发过程中编译的用于测试的内部版本。一个大型的软件项目通常需要执行多个内部版本的测试,因此需要按计划编译出多个版本用于测试。 版本环境(build environment)。用于编译软件应用程序的一些列文件的集合。

版本健康检查(build sanity check)。由软件编译者对刚刚编译的版本快速执行基本功能检查的活动,通过检查后,再由测试者进行正规详细测试。 级连样式表(cascading style sheet -CSS)。定义html等标示文件显示样式的外部文档。 字符集(character set)。从书写系统到二进制代码集的字符映射。例如,ANSI字符集使用8位长度对单个字符编码。而Unicode,使用16位长度标示一个字符。 简体中文,日文,韩文,繁体中文(CJKT)。也可以表示为SC/JP/KO/TC或 CHS/JPN/KOR/CHT,是英文Simplified Chinese, Janpanese, Korean, Traditional Chinese的简写。 代码页(code page)。字符集和字符编码方案。对每一种语言字符,都用唯一的数字索引表示。 附属条目(collateral)。软件本地化项目中相对较小的条目。例如,快速参考卡,磁盘标签,产品包装盒,市场宣传资料等。 计算机辅助翻译(Computer Aided Translation-CAT)。计算机辅助翻译。采用计算机技术从一种自然语言到另一种语言自动或支持翻译的技术术语。 串联(Concatenation)。添加文字或字符串组成较长字符传的方式。 控制语言(Controlled language)。自然语言的子集,常用于技术文档的写作,采用更加 专心翻译做到极致

JPEG图像的编解码实现

毕业论文论文题目(中文)JPEG图像的编解码实现 论文题目(外文)Encoding and decoding of JPEG image

摘要 JPEG是一种十分先进的图像压缩技术,它用有损压缩方式去除冗余的图像数据,在获得极高的压缩率的同时能展现十分丰富生动的图像。本文设计和实现一个JPEG图像编解码器来进行图像转换,利用离散余弦变换、熵编码、Huffman编码等图像压缩技术将BMP图像转换成JPEG图像,即进行图像的压缩。验证JPEG压缩编码算法的可行性。通过比对图像压缩前后实际效果,探讨压缩比,峰值信噪比等评价图像数据压缩程度及压缩质量的关键参数,对JPEG 压缩编码算法的实用性和优越性进行研究。 关键词:JPEG;编码;解码;图像压缩

Abstract JPEG is a very advanced image compression technology, it uses lossy compression to remove redundant image data, in obtaining a very high compression rate can show a very rich and vivid image. In this project, a JPEG image codec is designed and implemented to transform image, using discrete cosine transform, entropy coding, Huffman coding and other image compression techniques to convert BMP images into JPEG images. Verifies the feasibility of JPEG compression coding algorithm. Through the comparison of the actual effect of image compression, the key parameters of compression ratio, peak Snr, and the compression quality of image data are discussed, and the practicability and superiority of JPEG compression coding algorithm are researched. Key words: JPEG; encoding; decoding; image compression

图像处理中值滤波器中英文对照外文翻译文献

中英文资料对照外文翻译 一、英文原文 A NEW CONTENT BASED MEDIAN FILTER ABSTRACT In this paper the hardware implementation of a contentbased median filter suitabl e for real-time impulse noise suppression is presented. The function of the proposed ci rcuitry is adaptive; it detects the existence of impulse noise in an image neighborhood and applies the median filter operator only when necessary. In this way, the blurring o f the imagein process is avoided and the integrity of edge and detail information is pre served. The proposed digital hardware structure is capable of processing gray-scale im ages of 8-bit resolution and is fully pipelined, whereas parallel processing is used to m inimize computational time. The architecturepresented was implemented in FPGA an d it can be used in industrial imaging applications, where fast processing is of the utm ost importance. The typical system clock frequency is 55 MHz. 1. INTRODUCTION Two applications of great importance in the area of image processing are noise filtering and image enhancement [1].These tasks are an essential part of any image pro cessor,whether the final image is utilized for visual interpretation or for automatic an alysis. The aim of noise filtering is to eliminate noise and its effects on the original im age, while corrupting the image as little as possible. To this end, nonlinear techniques (like the median and, in general, order statistics filters) have been found to provide mo re satisfactory results in comparison to linear methods. Impulse noise exists in many p ractical applications and can be generated by various sources, including a number of man made phenomena, such as unprotected switches, industrial machines and car ign ition systems. Images are often corrupted by impulse noise due to a noisy sensor or ch annel transmission errors. The most common method used for impulse noise suppressi on n forgray-scale and color images is the median filter (MF) [2].The basic drawback o f the application of the MF is the blurringof the image in process. In the general case,t he filter is applied uniformly across an image, modifying pixels that arenot contamina ted by noise. In this way, the effective elimination of impulse noise is often at the exp ense of an overalldegradation of the image and blurred or distorted features[3].In this paper an intelligent hardware structure of a content based median filter (CBMF) suita ble for impulse noise suppression is presented. The function of the proposed circuit is to detect the existence of noise in the image window and apply the corresponding MF

图像编码技术的研究和应用

图像编码技术的研究和应用 一幅二维图像可以表示为将一个二维亮度函数通过采样和量化而得到的一个二维数组。这样一个二维数组的数据量通常很大,从而对存储、处理和传输都带来了许多问题,提出了许多新的要求。为此人们试图采用对图像新的表达方法以减少表示一幅图像需要的数据量,这就是图像编码所要解决的主要问题。压缩数据量的主要方法是消除冗余数据,从数学角度来讲是要将原始图像转化为从统计角度看尽可能不相关的数据集。这个转换要在图像进行存储、处理和传输之前进行,而在这之后需要将压缩了的图像解压缩以重建原始图像或其近似图像.图像压缩和图像解压缩,通常也分别称为图像编码和图像解码。 图像编码系统模型模型主要包括2个通过信道级连接的结构模块 :编码器和解码器。当一幅输入图像送入编码器后 ,编码器根据输入数据进行信源编码产生一组信号。这组信号在进一步被信道编码器编码后进入信道。通过信道传输后的码被送入信道解码器和信源解码器 ,解码器重建输出的图像。一般来说 ,输出图是输入图的精确复制 ,那么系统是无失真的或者信息保持型的 ;否则 ,称系统是信息损失的。 现代编码方法 这里介绍了几种比较热的编码方法:第二代编码方法、分形编码、模型编码、神经网络编码、小波变换编码。 1.第二代图像编码方法 第二代图像编码方法是针对传统编码方法中没有考虑人眼对轮廓、边缘的特殊敏感性和方向感知特性而提出的。它认为传统的第一代编码技术以信息论和数字信号处理技术为理论基础 ,出发点是消除图像数据的统计冗余信息 ,包括信息熵冗余、空间冗余和时间冗余。其编码压缩图像数据的能力已接近极限 ,压缩比难提高。第二代图像编码方法充分利用人眼视觉系统的生理和心理视觉冗余特性以及信源的各种性质以期获得高压缩比,这类方法一般要对图像进行预处理,将图像数据根据视觉敏感性进行分割。 2.分形图像编码 分形图像编码是在分形几何理论的基础上发展起来的一种编码方法。分形理论是欧氏几何相关理论的扩展,是研究不规则图形和混沌运动的一门新科学。它描述了自然界物体的自相似性,这种自相似性可以是确定的,也可以是统计意义上的。这一理论基础决定了它只有对具备明显自相似性或统计自相似性的图像,例如海岸线,云彩,大树等才有较高的编码效率。而一般图像不具有这一特性,因此编码效率与图像性质学特性有关 ,而且分形图像编码方法实质上是通过消除图像的几何冗余度来压缩数据的 ,根本没有考虑人眼视觉特性的作用。 3.基于模型的图像编码 基于模型的图像编码技术是近几年发展起来的一种很有前途的编码方法。它利用了计算机视觉和计算机图形学中的方法和理论 ,其基本出发点是在编、解码两端分别建立起相同的模型 ,针对输入的图像提取模型参数或根据模型参数重建图像。模型编码方法的核心是建模和提取模型参数,其中模型的选取、描述和建立是决定模型编码质量的关键因素。为了对图像数据建模, 一般要求对输入图像要有某些先验知识。目前研究最多、进展最快的是针对可视电话应用中的图像序列编码。这类应用中的图像大多为人的头肩像。 4.神经网络图像编码

图像处理在航天航空中的应用-结业论文

图像处理在航天航空中的应用-结业论文

论文题目:图像处理在航天和航空技术方面的运用 学院:机械电气工程学院 班级: 2012级机制3班 姓名:张娜 学号: 20125009077

摘要:图像处理技术的研究和应用越来越受到社会发展的影响,并以自身的技术特点反过来影响整个社会技术的进步。本文主要简单概括了数字图像处理技术的特点、优势,列举了数字图像处理技术的应用领域并详细介绍了其在航天航空领域中的发展。 关键字:图像处理简介技术的优点发展技术应用 一、引言 数字图像处理是通过计算机采用一定的算法对图像图形进行处理的技术,它已经在各个领域上都有了较广泛的应用。图像处理的信息量很大,对处理速度要求也很高。本文就简单的介绍图像处理技术及其在各个领域的应用,详细说明图像处理在航天航空技术方面的应用。 二、数字图像处理简介 (一)图像的概念 图像包含了它所表达的物体的描述信息。我们生活在一个信息时代,科学研究和统计表明,人类从外界获得的信息约有百分之七十来自视觉系统,也就是从图像中获得,即我们平常所熟知的照片,绘画,动画。视像等。 (二)数字图像处理技术 数字图像处理又称为计算机图像处理,它是指将图像信号转换成数字信号并利用计算机对其进行处理的过程。图像处理技术着重强调在图像之间进行的变换,主要目标是要对图像进行各种加工以改善图像的视觉效果并为其后的目标自动识别打基础,或对图像进行压缩编码以减少图像存储所需要的空间或图像传输所需的时间。图像处理是比较低层的操作,它主要在图像像素级上进行处理,处理的数据量非常大。数字图像处理的早期应用是对宇宙飞船发回的图像所进行的

图像处理外文翻译 (2)

附录一英文原文 Illustrator software and Photoshop software difference Photoshop and Illustrator is by Adobe product of our company, but as everyone more familiar Photoshop software, set scanning images, editing modification, image production, advertising creative, image input and output in one of the image processing software, favored by the vast number of graphic design personnel and computer art lovers alike. Photoshop expertise in image processing, and not graphics creation. Its application field, also very extensive, images, graphics, text, video, publishing various aspects have involved. Look from the function, Photoshop can be divided into image editing, image synthesis, school tonal color and special effects production parts. Image editing is image processing based on the image, can do all kinds of transform such as amplifier, reducing, rotation, lean, mirror, clairvoyant, etc. Also can copy, remove stain, repair damaged image, to modify etc. This in wedding photography, portrait processing production is very useful, and remove the part of the portrait, not satisfied with beautification processing, get let a person very satisfactory results. Image synthesis is will a few image through layer operation, tools application of intact, transmit definite synthesis of meaning images, which is a sure way of fine arts design. Photoshop provide drawing tools let foreign image and creative good fusion, the synthesis of possible make the image is perfect. School colour in photoshop with power is one of the functions of deep, the image can be quickly on the color rendition, color slants adjustment and correction, also can be in different colors to switch to meet in different areas such as web image design, printing and multimedia application. Special effects production in photoshop mainly by filter, passage of comprehensive application tools and finish. Including image effects of creative and special effects words such as paintings, making relief, gypsum paintings, drawings, etc commonly used traditional arts skills can be completed by photoshop effects. And all sorts of effects of production are

工具软件 翻译软件概述

工具软件翻译软件概述 翻译软件的产生是随计算机技术的进步而产生的一种应用软件。早期的翻译软件功能较弱,只能根据固定的词汇或词组进行翻译,仅相当于电子版本的词典。人工智能技术的发展为翻译软件提供了极大的技术支持。现代的翻译软件已经能够识别各种自然语言的简单语法,并根据一定的语义环境进行智能翻译。 1.翻译软件分类 根据翻译软件的功能,可以将翻译软件分为词典软件、屏幕翻译软件以及辅助翻译软件等三大类。 ●词典软件 词典软件是类似实体书词典的软件。其功能是将各种语言的词汇翻译存储到数据库中,供用户调用。当用户输入某个词汇后,即可将该词汇翻译为另一种语言,如图4-1所示。 图4-1 词典软件的原理 由于计算机存储数据和查找数据非常便捷,因此,词典软件的出现,免去了用户在实体书词典中翻找的不便,提高了用户查找词汇的效率。国内常用的词典软件包括金山词霸、东方大典等。 ●屏幕翻译软件 词典软件要翻译的主要是各种词汇和短语等,而屏幕翻译软件则需要对各种语句、段落甚至文章进行翻译。相对词典软件而言,屏幕翻译软件更加智能化,功能也更加强大。屏幕翻译软件的工作原理如图4-2所示。 图4-2 屏幕翻译软件的工作原理 屏幕翻译软件往往可以根据要翻译的内容词汇,自主选择相应的词典,然后根据词典的语义进行智能翻译。虽然屏幕翻译软件可以翻译一些简单的句子和段落,但仍然无法取代人工翻译。仅能在少数领域作为人工翻译的补充而存在。目前国内常用的屏幕翻译软件主要包括金山快译、灵格斯词霸等。 ●辅助翻译软件 辅助翻译软件是辅助人工翻译的软件。其作用是以数据库的方式储存原文和译文,在翻译时以电脑分析与搜寻翻译记忆库,找出相同或类似的句子,共译者参考。使用辅助翻译软

数字视频技术及应用复习题

第一章数字视频概述 1.什么是复合视频?2页,可改为填空题 例如:黑白视频信号是一个已经经过加工处理并包含扫描同步和消隐的图像信号,通常也叫做复合视频,简称视频。由于频带范围在1-6MHZ人们又把它叫做电视基带视频。 2.什么是视频技术?它主要应用在哪些领域?3页,可以改为填空题 例如:在不考虑电视调制发射和接收等诸多环节时,单纯考虑和研究电视基带信号的摄取、改善、传输、记录、编辑、显示的技术就叫做视频技术。 主要应用领域:广播电视的摄录编系统、安全及监控、视频通信和视频会议、远程教育及视听教学、影像医学、影音娱乐和电子广告。 3.什么是数字视频?5页 广义的数字视频表述为数字视频是指依据人的视觉暂留特性,借着计算机或微处理器芯片的高速运算,加上Codec技术、传输存储技术等来实现的以比特流为特征的,能按照某种时基规律和标准在显示终端上再现活动影音的信息媒介。狭义的数字视频时指与具体媒体格式所对应的数字视频。 第二章彩色数字视频基础 1.彩色电视系统是根据色光三基色原理来再现彩色图像的。按照此原理,任何一种色光颜色都可以用R G B三个彩色分量按一定的比例混合得到。7页 2.匹配兼容制彩色电视亮度信号的公式是:8页(2-2) 3.两个色差信号正交调制的目的是什么?10页 4.电视扫描分为逐行扫描和隔行扫描两种。 5.电视基带视频有复合视频、亮色分离视频和分量视频三种。13页 6.彩色电视制式有哪三种?制式差异主要体现在哪些方面?14页或改为填空 世界上现行的彩色电视制式有NTSC制式、PAL制式和SECAM制式三大制式。制式差异主要体现在亮度合成公式、色差信号提取、色副载选取及其正交调制类型、扫描方式、同步时基确定等方面的参数。 7.彩色电视图像的数字化有信号上游数字化和信号下游数字化两种。 8.A/D转换主要包括哪些环节?量化的实质是什么?编码的实质是什么?17,18页,可改为填空 A/D转换就是指对幅值连续变化的模拟视频电信号进行脉冲抽样保持、量化、编码等环节后形成二进制码流的技术处理过程。 9.一般常用的线性D/A转换器,其输出模拟电压U和输入数字量D之间成正比关系。19页 10.YCbCr信号和YUV信号是正比关系。21页,或选择A正比B反比C非线性D平方11.CCIR601标准为NTSC、PAL、和SECAM制式规定了共同的图像采样频率是13.5MHZ。21页 12.PAL制NTSC制的现行标准数字电视有效显示分辨率(清晰度)各为720X576像素和720X480像素。公用中分辨率为352X288像素。23页 第三章广义数字视频及分类 1.广义数字视频的定义?28页 2.广义的数字视频是依据人的视觉暂留特性,借助计算机或微处理器芯片的高速运算加上Codec编解码技术、传输存储技术等来实现的比特流为特征的全新的信息媒介。 3.图像序列的特点有哪些?33页 特点是每帧的分辨率相同,图像内容相关、图像文件名连续编号,而且有表示开始的图像序列头和表示结束的图像终止码。

图像处理技术原理及其在生活中的应用探讨

图像处理技术原理及其在生活中的应用探讨 摘要在社会生活实践中,图像处理技术获得了广泛的应用。这种技术之所以可以得到广泛应用,与其极强的功能所分不开的。在计算机算法不断改善的过程中,图像处理技术的发展前景是非常广阔的。笔者对图像处理技术的原理进行了分析,并其对在生活中的应用进行了探究[1]。 关键词图像处理技术原理;生活;应用 1 图像处理技术的原理分析 所谓的图像处理技术,就是通过计算机技术以及相关的技术来对图像进行处理,从而使图像更好地为我们所利用的一种技术。在这个过程中,需要运用到几个技术要点。第一个就是使图像进行转换,从而得到计算机容易识别的矩阵,这种矩阵被称为是“数字矩阵”。这样得到的矩阵更容易被计算机所存储。第二就是通过多种算法来实现对计算机所存储的图像进行有关处理,其中用到的常用算法就有基于人眼视觉特性的阈值算法、具有去噪功能的图像增强算法等。第三就是在进行了一些技术性的处理,然后获取图像信息。通过中国知网、万方数据库等平台所查阅到的图像类型相关资料可知,图像的类型主要可以分为两大类,一类是数字化图像,另一类是模拟图像。前者不仅处理便捷,而且精度较高,能够适应现代社会的发展要求,后者在现实生活中的应用更为常见,比如在相机图片中的应用。模拟图像输出较为简单,灵活性和精度不太高,因此其使用的限制性较大[2]。 2 图像处理技术原理在生活中的应用探讨 2.1 图像处理技术原理在安全防范中的应用 在安全防范监控系统不断发展的过程中,系统从模拟向数字的方向发展,这跟人们要求图像的精准度越来越高有关。在安防领域,图像处理技术如果能够得到很好的利用,那么就可以实现对图像的去噪声处理,对失真的图像进行矫正处理。在公安部门破案的过程中,有时会根据犯罪现场的指纹特征来对视频采集参数进行调节,比如色彩补偿就是一种很好的调節方法,这样方便公安部门更快地破案。尽管现在的监控系统越来越完善,但是如果遇到暴风暴雨和雾霾或者光线较弱的天气,那么监控得到的视频图像往往还是比较模糊的,对于这些模糊的图像,可以通过图像增强技术进行一些处理,从而为后续的公安部门调查和取证提供便利,模糊图像处理技术这时就排上了用场[3]。 2.2 图像处理技术原理在娱乐休闲领域的应用 在娱乐休闲领域,图像处理技术原理主要的应用场合就是平时我们利用手机或数码相机摄影以及电影特效制作等场合。在数码相机出现以前,图像只能使用传统相机通过胶片的形式保存。在数码相机出现之后,人们就可以短时间内对相

图像处理中常用英文词解释

Algebraic operation 代数运算一种图像处理运算,包括两幅图像对应像素的和、差、积、商。 Aliasing 走样(混叠)当图像像素间距和图像细节相比太大时产生的一种人工痕迹。Arc 弧图的一部分;表示一曲线一段的相连的像素集合。 Binary image 二值图像只有两级灰度的数字图像(通常为0和1,黑和白) Blur 模糊由于散焦、低通滤波、摄像机运动等引起的图像清晰度的下降。 Border 边框一副图像的首、末行或列。 Boundary chain code 边界链码定义一个物体边界的方向序列。 Boundary pixel 边界像素至少和一个背景像素相邻接的内部像素(比较:外部像素、内部像素) Boundary tracking 边界跟踪一种图像分割技术,通过沿弧从一个像素顺序探索到下一个像素将弧检测出。 Brightness 亮度和图像一个点相关的值,表示从该点的物体发射或放射的光的量。 Change detection 变化检测通过相减等操作将两幅匹准图像的像素加以比较从而检测出其中物体差别的技术。 Class 类见模或类 Closed curve 封闭曲线一条首尾点处于同一位置的曲线。 Cluster 聚类、集群在空间(如在特征空间)中位置接近的点的集合。 Cluster analysis 聚类分析在空间中对聚类的检测,度量和描述。 Concave 凹的物体是凹的是指至少存在两个物体内部的点,其连线不能完全包含在物体内部(反义词为凸) Connected 连通的 Contour encoding 轮廓编码对具有均匀灰度的区域,只将其边界进行编码的一种图像压缩技术。 Contrast 对比度物体平均亮度(或灰度)与其周围背景的差别程度 Contrast stretch 对比度扩展一种线性的灰度变换 Convex 凸的物体是凸的是指连接物体内部任意两点的直线均落在物体内部。Convolution 卷积一种将两个函数组合成第三个函数的运算,卷积刻画了线性移不变系统的运算。 Corrvolution kernel 卷积核1,用于数字图像卷积滤波的二维数字阵列,2,与图像或信号卷积的函数。 Curve 曲线1,空间的一条连续路径,2 表示一路径的像素集合(见弧、封闭曲线)。 Deblurring 去模糊1一种降低图像模糊,锐化图像细节的运算。2 消除或降低图像的模糊,通常是图像复原或重构的一个步骤。 Decision rule 决策规则在模式识别中,用以将图像中物体赋以一定量的规则或算法,这种赋值是以对物体特征度量为基础的。 Digital image 数字图像 1 表示景物图像的整数阵列,2 一个二维或更高维的采样并量化的函数,它由相同维数的连续图像产生,3 在矩形(或其他)网络上采样一连续函数,并才采样点上将值量化后的阵列。 Digital image processing 数字图像处理对图像的数字化处理;由计算机对图片信息进

图像处理技术及其应用

图像处理技术及其应用 姓名: (班级:学号:) 【摘要】图像处理技术的研究和应用越来越收到社会发展的影响,并以自身的技术特点反过来影响整个社会技术的进步。本文主要简单概括了数字图像处理技术近期的发展及应用现状,列举了数字图像处理技术的主要优点和制约其发展的因素,同时设想了图像处理技术在未来的应用和发展。 【关键字】图像处理;发展;技术应用 1 引言 计算机图像处理技术是在20世纪80年代后期,随着计算机技术的发展应运而生的一门综合技术。图像处理就是利用计算机、摄像机及其它有关数字技术,对图像施加某种运算和处理,使图像更加清晰,以提取某些特定的信息,从而达到特定目的的技术。随着多媒体技术和网络技术的快速发展,数字图像处理已经广泛应用到了人类社会生活的各个方面,如:遥感,工业检测,医学,气象,通信,侦查,智能机器人等。无论在哪个领域中,人们喜欢采用图像的方式来描述和表达事物的特性与逻辑关系,因此,数字图像处理技术的发展及对其的要求就越来显得重要。 2 图像处理技术发展现况 进入21世纪,随着计算机技术的迅猛发展和相关理论的不断完善,数字图像处理技术在许多应用领域受到广泛重视并取得了重大的开拓性成就。随着计算机技术和人工智能、思维科学研究的迅速发展,数字图像处理向更高、更深层次发展。人们已开始研究如何用计算机系统解释图像,实现类似人类视觉系统理解外部世界,这被称为图像理解或计算机视觉。 从图像变换方面来讲,目前新兴研究的小波变换在时域和频域中都具有良好的局部化特性,它在图像处理中也有着广泛而有效的应用;而图像增强和复原图像增强和复原的目的是为了提高图像的质量,如去除噪声,提高图像的清晰度等,目前主要在指纹图像增强处理技术,医学影像学方面有显著的成果。这项技术使得各自图像的空间分辨率和对比度有了更大的提高,而最新的医学图像融合则是指对医学影像信息如CT、MRI、SPECT和PET所得的图像,利用计算机技术将它们综合在一起,实现多信息的同步可视化,对多种医学影像起到互补的作用。图像分割图像分割是数字图像处理中的关键技术之一。图像分割是将图像中有意义的特征部分提取出来,这是进一步进行图像识别、分析和理解的基础。虽然目前已研究出不少边缘提取、区域分割的方法,但还没有一种普遍适用于各种图像的有效方法。因此,对图像分割的研究还在不断深入之中,是目前图像处理中研究的热点之一。 图像描述图像描述是图像识别和理解的必要前提。作为最简单的二值图像可采用其几何特性描述物体的特性,一般图像的描述方法采用二维形状描述,它有边界描述和区域描述两类方法。对于特殊的纹理图像可采用二维纹理特征描述。随着图像处理研究的深入发展,已经开始进行三维物体描述的研究,提出了体积描述、表面描述、广义圆柱体描述等方法;图像分类(识别)图像分类(识别)属于模式识别的范畴,其主要内容是图像经过某些预处理(增强、复原、压缩)后,进行图像分割和特征提取,从而进行判决分类。近年来新发展起来的模糊模式识别和人工神经网络模式分类在图像识别中也越来越受到重视。 3 图像处理技术应用现状 图像是人类获取和交换信息的主要来源,因此,图像处理的应用领域必然涉及到人类生活和工作的方方面面。随着人类活动范围的不断扩大,图像处理的应用领域也将随之不断扩大。 3.1航天和航空技术方面的应用 数字图像处理技术在航天和航空技术方面的应用,许多国家每天派出很多侦察飞

常用工具软件试题库

《常用工具软件》考试题库 一.判断题(每小题1分,共10分) 1. Realone Player不支持多节目连续播放。(X) 2.网际快车可以上传和下载文件。(√) 3. Internet上所有电子邮件用户的E-mail地址都采用同样的格式:用户名@主机名。(√) 4.Adobe Acrobat Reader可以解压缩文件。(X) 5.ACDSee是目前最流行的数字图像处理软件,它能广泛应用于图片的获取、管理、浏览、优化,甚至和他人的分享。(√) 6.天网防火墙的拦截功能是指数据包无法进入或出去。(X) 7.Symantec Ghost可以实现数据修复。(X) 8. 用户可以向金山词霸词库中添加没有收录的中、英文单词。(√) 9.系统长时间使用之后,会留下一堆堆垃圾文件,使系统变得相当臃肿,运行速度大为下降,但是系统不会频繁出错甚至死机。(√) 10.在使用FlashFXP软件下载网络中的FTP资源时,只需掌握FTP服务器的URL地址即可。(√) 11.在安装瑞星防火墙时,旧版本的瑞星防火墙无需卸载。(X) 12.压缩文件管理工具WinRAR只能压缩文件,不能对文件进行解压。(X) 13.在使用Virtual CD时,映像文件是不能被Windows资源管理器直接读取的,必须从Virtual CD中提取。(√) 14.在用Nero - Burning Rom软件制作CD时,可将数据文件从本地资源管理器中拖入了刻录机虚拟资源管理器中。(X) 15. 超级解霸3000能截取当前视频窗口中的图像存为图形文件。(√) 16.用MSN聊天时,可以隐身登录。(√) 17.ACDSee是目前最流行的数字图像处理软件,它能广泛应用于图片的获取、管理、浏览、优化,甚至和他人的分享。(√) 18、病毒不属于计算机软件(×) 19、优化大师就是让系统运行后没有垃圾文件(×) 20、注册表直接影响系统运行的稳定性(√) 21、清理注册表就是删除注册表中无用软件的注册信息(×) 22、360杀毒不能对单个文件进行病毒查杀(×) 23、根据工具软件使用的领域不同,但是一般都包含有标题栏、菜单栏、工具栏、状态栏、工作区。(√) 24、在进行实验操作时,为了不破坏现有的操作系统以及相关设置,我们可以使用虚拟机软件。(√) 25、在使用虚拟机的时候,按键盘右边的ALT可以在虚拟机和宿主机之间切换。(√) 26、CuteFTP是一个基于文件传输协议客户端软件。(√) 27、虚拟光驱是一种模拟CD-ROM工作的工具软件,它能在操作系统中模拟出新的光盘驱动器,是对物理光驱的一种仿真。(√) 28、利用ghost可以备份windows操作系统。(√) 29、常见的压缩格式ZIP格式、RAR格式、CBA格式、ACE格式。(√) 30、利用CuteFTP软件可以上传网站文件。(√) 31、Deamon Tools是一个优秀的虚拟光驱工具。(√)

常用CAT计算机辅助翻译软件

常用CAT计算机辅助翻译软件 1、SDL TRADOS SDL Trados为他们克服了在不同国家地区的文化、语言障碍,从而为他们的全球化铺平了发展道路。因为SDL Trados用户通常能够将完成工作的速度提高50%左右(具体数值依不同文档,项目会有变化),更准确地评估时间和成本,显著减少翻译错误,编写更为一致的翻译(对技术、法律和医学翻译来说,这一点尤其重要)。这正因为其功能强大,在操作性方面就有所不足,在国内来说普及度不高。 2、iCAT iCAT辅助翻译工具免费软件,内嵌到Word工具中,支持最新的Word2013,支持64、32的系统,支持中文、繁体中文、英、日、韩、德、法、俄、西班牙等。它提供独立的术语和翻译记忆库(TM),可以同时挂多个术语库,同时通过火云术语配合使用,实现术语分享和收藏功能,达到云端保存的效果。自带机器翻译,术语批准等功能,同时译员通过使用该工具能及时了解自己最新的翻译字数。对于译后稿,提供3种保存格式,解决了译员对译后稿件的排版麻烦。该公司有兼全职译员3W多名,同时在各高校MTI教学和外语类实验室广泛使用,故在国内知名度很高。 3、passolo Passolo 是一款功能强大的软件本地化工具,它支持以Visual C++ 、Borland C++ 及Delphi 语言编写的软件(.exe、.dll、.ocx)的本地化。以往针对这两种不同语言编写的软件,我们大多是需要分别使用Visual Localize 和Language Localizator 来进行软件的中文化。而现在,Passolo 把二者的功能结合在了一起,并且性能稳定、易于使用,用户即不需要进行专门的训练,也不需要丰富的编程经验,在本地化的过程中可能发生的许多错误也都能由Passolo 识别或自动纠正。所以,passolo是软件本地化不二的选择。 4、Transmate Transmate 提供了独立的翻译操作界面,不依赖、也无需与其他应用程序交互(如MS WORD),在单一的程序界面中集成了翻译记忆库(TM)、术语库和翻译单元列表,界面简洁,操作方便。不像使用老版Trados 那样,需要启动多个不同的应用程序来分别操作记忆库、术语库和相关的文件。因其Transmate其实验室产品在高校广泛应用,故儿成为国内大多数译员比较熟悉的工具,在翻译公司的应用率也相对较高。 5、WordFast Wordfast 是结合Microsoft Word 使用的翻译记忆引擎。它可以在PC 或Mac 操作系统下运行。(请参阅技术规格或支持的操作系统)Wordfast 数据具有易用性和开放性,同时又与Trados 和大多数计算机辅助翻译(CAT) 工具兼容。它不仅可被用来翻译Word, Excel, Powerpoint, Access 文件,还可被用来翻译各种标记文件。此外,Wordfast 还可以与诸如PowerTranslator?,Systran?,Reverso? 等机器翻译(MT) 软件连接使用。另外,它还具有强大的词汇识别功能。所以,个人译员使用的比例相对较高. 6、Logoport Lionbridge 的免费产品,嵌入Word工具中,至于它的RTF文件是怎么做出来的,不得而知。它使用在线的TM服务器,可以很多译员同时翻译一个文件,TM时时共享,这和免费使用可以说是Logoport最大的优势,但是因为使用在线的TM,可能是他们服务器在国外的原因,每打开一个翻译单元格,都要花费一两秒钟的时间,译员怨声不断。初次看到分析出来的Log文件,可能会受到误导,认为那些100%匹配不用翻译,其实Logoport是用本文件将要翻译出来的TM结果分析未曾翻译的文件,乍一看好似很多匹配,实际上都是需要翻译的"新词",不过,匹配部分算钱的办法还算合理,比Trados匹配部分要高很多。所以,CAT爱好者可以玩一玩.

图像编解码技术及应用

图像编解码技术及应用 1.图像编解码技术概论: 在当前的图像压缩领域中常用的技术有: BMP、EPS、GIF、JPG、PDF、PIC、PNG、PSD、TIF。上述技术间的差异主要存在于图像编解码的算法不同,通过对算法的研究可以使我们更加容易的理解图像压缩的原理。 位图格式(BMP)是在DOS时代就出现的一种元老级文件格式,因此它是DOS和WINDOWS操作系统上的标准的WINGDOWS点阵图像格式,以此文件格式存储时,采用一种非破坏性的RLE压缩,不会省略任何图像的细部信息。 EPS是最常见的线条稿共享文件格式,它是以PostScript语言为开发基础,所以EPS文件能够同时兼容矢量和点阵图形,所有的排版或图像处理软件如PageMaker或Illustrator等,都提供了读入或置入EPS格式文件的能力,而且RGB和CMYK对象也可以保有各自的原始的色彩模式。 GIF应该是在网络上最常见的一种压缩文件格式,它的英文全名Graphic Interchange format,当初研发的目的是为了最小化电缆上的传输,因此能采用LZW方式进行压缩,但可显示的颜色范围只局限于256索引色,目前所采用 的GIF图形共有两种格式:87a和89a,常见于网页上建议的小动画制作,其中GIF89a还可提供透明色效果,点阵图形,灰度图形或者索引颜色模式皆可存储为此种文件格式 JPG跟GIF一样为网络上最常见道的图像格式,其英文正式名称为Joint Photographic Experts Group,它是以全彩模式进行显示色彩,是目前最有效率的一种压缩格式,常用于照片或连续色调的显示,而且没有GIF去掉图像细 部信息的缺点,但需要注意的是此类图像需要自行设置压缩程度,在打开时JPG 图像会自动解压缩,不过要注意的是JPG采用的压缩是破坏性的压缩,因此会在一定程度上减损图像本身的品质。

相关文档
最新文档